Slashdot videos: Now with more Slashdot!

View

Discuss

Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

RockDoctor writes "Reports indicate that a suspect has been arrested in the Australian 'collar bomb' hostage/extortion case. The allegation is that the suspect had set up a Gmail account, through which he (allegedly) planned to communicate with the extortion victims and arrange delivery of the payment. Unfortunately for him, records were kept showing the location and time the account was set up, and also for a number of accesses. This information, combined with 'CCTV footage and motor vehicle records,' allowed the police to put an identity to the suspect, and arrange for his arrest. So, if you're planning an extortion scheme, don't drive your car to the internet cafe, don't set up the account from an airport, wear anonymous clothes (like Jason Bourne does?) and do all your accesses through hacked shell accounts somewhere in Outer Mongolia. But, this being Slashdot, everyone knew that already."

So, if you're planning an extortion scheme, don't drive your car to the internet cafe, don't set up the account from an airport, wear anonymous clothes (like Jason Bourne does?) and do all your accesses through hacked shell accounts somewhere in Outer Mongolia.

And don't use Google, who fed the IP information to the police.* That seems to be the key here; without an ability to link the GMail account to an IP address in the first place, they never would have found a physical location at which to look for a specific person or a car.

* GMail headers, last I checked, do not contain this information. Some webmail providers add an X-Originating-IP header, e.g. Hotmail, but Google doesn't.